• Title/Summary/Keyword: Managed Objects

Search Result 114, Processing Time 0.024 seconds

Design and Implementation of Remote Procedure Call Resource Service System based on the XML Considering the Request Delegation between the Servers (서버 간 요청 위임을 고려한 XML 기반 RPC 자원 서비스 시스템 설계 및 구현)

  • 김정희;곽호영
    • Journal of Korea Multimedia Society
    • /
    • v.6 no.6
    • /
    • pp.1100-1110
    • /
    • 2003
  • Design and implementation of remote procedure cail (RPC) resource service system based on the XML considering the request delegation between the servers are described for the resource application and efficient processing of distributed environment. For this purpose, the request information about several server, which would be used by client, is encoded into XML document based on XML-DOM and transferred to server. Server classifies the client requests using objects which can deal with the XMLL-DOM. For the request delegation between the servers, server saves the request result of client in XMLL-DOM structure without replying it immediately, and makes the client request delegated to another server in XML-DOM's request information. In addition, the resource repository are managed for resource transparency of distributed environment. As a result, resource application and processing efficiency are improved by reduction of response time caused by integration of RPC and XML-RPC services and request delegation between the servers. Extension of asynchronous and average blocking time of client were reduced and information of resource which can be used by client was offered.

  • PDF

Rethinking the Regulation of Suggestive Advertising for Juvenile Protection: Focusing on the Meaning of 'Suggestive Advertising' (청소년 보호를 위한 '선정적 광고'의 규제에 대한 재고: '선정적 광고'의 의미를 중심으로)

  • Cho, Jae-Yung
    • Journal of the Korea Convergence Society
    • /
    • v.9 no.2
    • /
    • pp.145-150
    • /
    • 2018
  • Recently, it has been continually researched that the advertising regulation should be tightened since suggestive advertising in Internet affect more negatively juveniles. Most of the researches seem to overlook an important fact that the objects of the researches, suggestive advertising are different from the harmful advertising to juveniles defined by the Juvenile Protection Act because they approached with ethical perspectives, not legally. It can be judged that the suggestive advertising in the past researches are not actually harmful advertising regulated by the Act, so the suggestive advertising should be properly managed for protecting juveniles, not banned. In this context, this study suggested that more proper and reasonable advertising regulations in Internet environment for protecting juveniles, with reviewing the problems of regulation system of media product harmful to juveniles, focusing on the differences between 'suggestive' and 'harmful' advertising to juveniles by the Act.

The Characteristics and Use of Moon Ik-Hwan's Prison Letters (문익환 옥중서신의 특성과 활용)

  • Oh, Myung Jin
    • The Korean Journal of Archival Studies
    • /
    • no.66
    • /
    • pp.317-355
    • /
    • 2020
  • Moon Ik-hwan's prison letters are valuable historical materials managed by the Moon Ik-hwan House of Unification, reflecting an aspect of modern and contemporary South Korea. He wrote these prison letters during a period of approximately 11 years and three months. Today about 800 of them remain and are in an urgent need for measures to ensure their long-term preservation and Use. This study set out to introduce their current state that had been made to the public only in fragments, analyze their characteristics as objects of records management, and propose directions and strategies to provide them as part of online service. For these purposes, the investigator analyzed Moon's personal life and life in prison as the backgrounds of their creation and examined their unique characteristics as prison letters according to the scope and size, recipients, reproduction and circulation process, and the medium of lettercards. Based on these efforts, the study shed new light on the significance of use in private archives and provided a case of online utilization tasks and strategies based on the characteristics of letters as one of the representative types of personal records.

Development of Ubuntu-based Raspberry Pi 3 of the image recognition system (우분투 기반 라즈베리 파이3의 영상 인식 시스템 개발)

  • Kim, Gyu-Hyun;Jang, Jong-Wook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.10a
    • /
    • pp.868-871
    • /
    • 2016
  • Recently, Unmanned vehicle and Wearable Technology using iot research is being carried out. The unmanned vehicle is the result of it technology. Robots, autonomous navigation vehicle and obstacle avoidance, data communications, power, and image processing, technology integration of a unmanned vehicle or an unmanned robot. The final goal of the unmanned vehicle manual not autonomous by destination safely and quickly reaching. This paper managed to cover One of the key skills of unmanned vehicle is to image processing. Currently battery technology of unmanned vehicle can drive for up to 1 hours. Therefore, we use the Raspberry Pi 3 to reduce power consumption to a minimum. Using the Raspberry Pi 3 and to develop an image recognition system. The goal is to propose a system that recognizes all the objects in the image received from the camera.

  • PDF

Access Control of XML Object Using Role Hierarchy and Cryptographic Key Assignment Scheme (역할 계층과 암호학적인 키 할당 기법을 이용한 XML 객체의 접근제어)

  • Bae Kyoung-Man;Kim Jong-Hoon;Ban Yong-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.15 no.6
    • /
    • pp.93-103
    • /
    • 2005
  • As the usage of XML documents increases the requirement of security for XML documents is growing. Especially it is very important to solve the problem of access control to XML object which shares in the environment where various users connect to each others. In this paper, we propose the access control model and mechanism which is combined with role hierarchy in the RBAC and hierarchical key derivation/assign method for the access to XML object. So we implement the access control mechanism by including hierarchical key derivation method. The technique, we proposed, gives not only the benefit in management which RBAC provides in access control to XML objects, but also it ran help derive a lower layer key from the higher layer user's. This feature decrease the number of keys managed in each role hierarchy in comparison with previous methods.

A model to secure storage space for CCTV video files using YOLO v3

  • Seong-Ik, Kim
    • Journal of the Korea Society of Computer and Information
    • /
    • v.28 no.1
    • /
    • pp.65-70
    • /
    • 2023
  • In this paper, we propose a CCTV storage space securing model using YOLO v3. CCTV is installed and operated in various parts of society for disasters, disasters and safety such as crime prevention, fire prevention, and monitoring, and the number of CCTV is increasing and the quality of the video quality is improving. Due to this, as the number and size of image files increase, it is difficult to cope with the existing storage space. In order to solve this problem, we propose a model that detects specific objects in CCTV images using YOLO v3 library and deletes unnecessary frames by saving only the corresponding frames, thereby securing storage space by reducing the size of the image file, and thereby Periodic images can be stored and managed. After applying the proposed model, it was confirmed that the average image file size was reduced by 94.9%, and it was confirmed that the storage period was increased by about 20 times compared to before the application of the proposed model.

Development of an IoT System Based on the oneM2M Communication Protocol (oneM2M 통신 프로토콜 기반 사물인터넷 시스템 개발)

  • Park, Kee-Hyun;Lee, Jong-Hwi;Woo, Min-Woo;Park, Joon-Suu
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.6 no.3
    • /
    • pp.41-49
    • /
    • 2016
  • In this paper, an IoT system which is increasingly popular in these days is developed. Among various international standards on the area, one M2M communication protocol is used in the system. The 0neM2M-based IoT system consists of ADN-AE modules and CSE modules. The ADN-AE module provides applications of various services. It also monitors a CSE module. The CES module is a platform that provides common services which should be provided to various AEs in an IoT system. The CSE module consists of a Network Manager module, a Message Handler module, and a Resource Manager module. The Network Manager module controls oneM2M communication and data flow in the system. The Message Handler module processes transmitted messages and the Resource Manager module manages the Resource Tree. The resource tree stores information of the objects to be managed in the system. Also, internal data flow and protocol mapping in the modules are explained.

Clinical Evaluation of Surgical Treatments for Ten Cases of Tuberculous Spondylitis (결핵성 척추염 10례의 수술적 치료에 관한 임상적 고찰)

  • Whee, Sung Mock;Eoh, Whan;Nam, Do Hyun;Lee, Jung Il;Kim, Jong Soo;Hong, Seung-Chyul;Shin, Hyung Jin;Park, Kwan;Kim, Jong-Hyun
    • Journal of Korean Neurosurgical Society
    • /
    • v.30 no.11
    • /
    • pp.1314-1319
    • /
    • 2001
  • Objects : Because of the nonspecific nature of symptoms in tuberculous spondylitis, a delay in the diagnosis can result in progressive neurologic deficits. The authors evaluate the clinical and the radiological results of the 10 cases of surgically treated tuberculous spondylitis. Clinical materials & Methods : We retrospectively analyzed the medical records of 10 patients with tuberculous spondylitis who were treated between February 1996 and March 2000. Six patients were female, and four were male. Mean age was 43 years old, and mean follow-up period was 20.5 months. All patients were treated with 12 months of antituberculous medication postoperatively, and were followed by complete blood count, ESR, spine X-ray and MRI. Results : The lumbar spine was involved in 5 patients, the thoracic in 4, and the thoracolumbar in one. The infected vertebral bodies were 2.8 in average. The associated lesions were pulmonary tuberculosis in 3 cases, and renal tuberculosis in one. Five patients were treated by anterior debridement and fusion with bone graft using anterior instrumentation, 2 with anterior debridement and fusion with bone graft(Hong Kong procedure only), 1 with Hong Kong procedure with posterior spinal instrumentation, and 2 were managed with posterior debridement and posterior spinal instrumentation. All patients improved after operation, and the average kyphotic angle decreased postoperatively. Postoperatively, one patient had a fistula at the operative site. Conclusion : The debridement and minimal level fusion of motion segment with instrument fixation is one of surgical option for tuberculous spondyltis to preserve the spine motion segment as much as possible. Spine instability and kyphosis were prevented by anterior and posterior spinal instrumentation. But, large number of cases and longer period follow-up study in future will be needed to confirm the long term results.

  • PDF

Design and Implementation of EMS(Element Management System) based on TMN Architecture (TMN체계의 EMS(Element Management System) 설계 및 구현)

  • 정연기;서승호;김영탁
    • Journal of Korea Multimedia Society
    • /
    • v.2 no.1
    • /
    • pp.69-79
    • /
    • 1999
  • We have implemented the telecommunication management functions based on TMN (Telecommunications Management Network) architecture that is standardized by ISO/ITU-T. TMN has been developed to manage heterogeneous networks, services and equipment. In this paper, we first analyze the detailed functions of EMS (Element Management System) that performs core functions in the subnetwork management of TMN architecture. We propose an implementation method of EMS for efficient subnetwork management and verify its performance and functionality through detailed implementation and various testing. The proposed EMS consists of EML-Manager module and NML-Agent module. The EML-Manager module controls NEL (Network Element Layer) through the CMIP operations on the managed-objects. The NML-Agent module processes the requests from NMS (Network Management System) in upper layer. We have implemented NMS that performs only the NML-Manager function to test the proposed EMS, and we have used NE-Agent that was designed and implemented by the B-ISDN Lab. of Yeungnam University. The implemented EMS has three management functions: configuration management function, performance management function, and fault management function. We confirmed that the EMS operated normally as we tested the EMS. As further research works, the implementation of NMS with both NML-Manager function and SML-Agent function is required.

  • PDF

A study on the improvement of the distribution system of government publications in Korea (우리나라 정부간행물의 유통체계 개선에 관한 연구)

  • 사공복희;문승주
    • Journal of Korean Library and Information Science Society
    • /
    • v.26
    • /
    • pp.93-130
    • /
    • 1997
  • The objective of this study is to catch hold of the problem occurring in the process in which librarians have obtained government publications and to show the method that can construct the rational distribution system of government publications. For this study, total 56 librarians who work for 44 institutes sponsored by central government and 12 institutes sponsored by local government were chosen as the objects of research and questionnaire survey to know how to obtain government publications. How to construct the rational distribution system of government publications is as follows. (1) The exclusive organization to manage overall service for government publications should be established newly or previous similar organization should be reorganized. (2) As reinforcing the law concerning deposit copy, government publications should be distributed obligatorily to all of the depository agency, and the depository library system of government publications should be introduced and managed newly. Especially the management of deposit copy and the depository library system of government publications should be undertaken by the exclusive agency of government publications. (3) Free-government publications should be converted to pay-government publications as much as possible so that everyone can purchase government publications easily. And free-government publications which are difficult to convert to pay-government publications should be distributed according to rational standard by the exclusive agency of government publications. (4) Pay-government publications should be sold by private distribution organization under exclusive agency of government publications. Also printing, editing and pricing of pay-government publications should be done by private distribution organization to compete with general books. (5) In order to promote the sales of pay-government publications, the sales centers of government publications must be established even in city and county. Also special government publications which have much demand should be sold even in general book stores. Especially the management of the sales centers should be undertaken by private distribution organization. (6) It is necessary to abolish or improve unreasonable regulations or system related to government publications and to make legislative, institutional devices for government publications. (7) The public relations for government publications should be enforced much through TV or radio etc. , and the various bibliographic tools of government publications should be developed and disseminated for the sake of much utilization of government publications. (8) By using new technology like CD-ROMs or communication networks, electronic production and distribution of government publications should be push ahead positively. And electronic information distribution center to su n.0, pport it should be established by government agency.

  • PDF